About Us

Intigriti Raised €21 Million to Help Ethical Hackers

Intigriti integrates over 15,000 ethical hackers from 130 countries with businesses to test and improve their security. Through continuous pen-testing, bug bounty, and asset monitoring solutions. Intigriti transforms traditional testing techniques into a more flexible and data-driven approach. This method represents the evolution of security testing and is better suited to today’s dynamic environment.

Intigriti has managed to grow by 650 per cent since its initial funding round in 2020, establishing itself as the European pioneer and the world’s fastest-growing crowdsourced security platform. Integriti has sealed the largest funding round for a crowdsourced security platform in Europe, raising €21,133,700 million in a Series B round. Octopus Ventures, one of Europe’s largest investors, led the round. EnBW New Ventures, based out of Germany, is also a participant in the round, as is ETF Partners, a previous investor and Intigriti’s largest shareholder. Intigriti’s sole financial adviser was Results.

Stijn Jans, CEO at Intigriti said, “We anticipate crowdsourced security to be a default career option for talented cybersecurity graduates by 2026, surpassing consultancy in popularity. While the remote working culture introduced new security risks, it also provided companies with the opportunity to work with international talent that was previously out of reach.”

Intigriti has released its ‘hybrid pentest’ offering to help with the transition from traditional consulting to the new way of working. Companies will be able to work with selected researchers in individual engagements within an agreed-upon timeframe but at a result-based rate, similar to bug bounty programs. The hybrid pentest, just like all Intigriti offerings, will include triage services, a critical in-house validation process that ensures clients only receive valid, unique, and in scope vulnerability reports. Penetration testers who tried out the new service earned more than €100,000 during a successful pilot phase that led to the release.

Holger Wagner, Investment Director at EnBW New Ventures, commented, “Critical infrastructures are subject to change in the context of digitalisation. Here we still see a lot of potential in the area of security solutions and their utilisation. Technology won’t be the only answer, it is a combination with the intelligence of the crowd.”

Remy de Tonnac, Partner, ETF partners stated, “Intigriti’s commitment to a more sustainable and secure world is incredibly inspiring and we’re proud to support the business on the next phase of this tremendous journey. As the team has demonstrated over the years, ethical hackers are the future. This large and talented pool of cyber experts is perfectly positioned to address the needs of a sustainable economy by future-proofing critical sectors such as smart cities, IoT systems, smart grids, autonomous vehicles, and the sharing economy.”

Paul Davidson, Investor at Octopus Ventures stated, “Cybersecurity companies can create a certain level of automation, but human intelligence still ranks ahead when it comes to identifying security threats. Intigriti has developed a differentiated platform proposition that enables the brightest minds in security to detect the broadest and most critical set of risks. We believe this team can drive this fast-growing category forward with their modern and data-compliant approach.”

Read more news:

BreachBits Launches BreachRisk, a New Cyber Risk Scoring Standard

Trend Micro Introduces a New Security Platform



Security analytics is a method of threat detection and security monitoring that employs data collecting, aggregation, and analysis technologies. Security analytics technologies enable organizations to evaluate security events to discover possible attacks before they have a detrimental impact on the company’s infrastructure and bottom line.

To detect, evaluate, and mitigate internal risks, as well as persistent cyberthreats and targeted attacks from external bad actors, security analytics integrates big data skills with threat intelligence.

Cybersecurity analytics are significant because they allow IT, security teams to take control of cybersecurity monitoring. Security analytics can help your organization get insight across its whole IT ecosystem, enabling faster threat detection and the automation of more manual security activities.

The Role of Security Analytics

Security analytics is a developing field with a lot of potential for enterprises that want to remain on top of vulnerabilities and stay one step ahead of cybercriminals.

A number of factors are driving the expansion of security analytics, including:

Transitioning from protection to detection: Hackers deploy a variety of attack strategies to exploit numerous vulnerabilities. For months, certain risks can go undiscovered. Security analytics systems can monitor common threat trends and send notifications when anomalies are identified.

A unified perspective of the enterprise: Security analytics organizes data in such a way that it can be viewed in real-time as well as in the past. This enables smarter planning, faster resolution, and better decision-making by providing a unified view of risks and security breaches from a central console.

Seeing outcomes and getting a return on investment: IT teams are under increasing pressure to convey their findings to senior management and stakeholders. Security analytics enables analysts to quickly identify risks and respond to security breaches by providing time-to-resolution metrics and fewer false positives.



Organizations benefit from security analytics technologies in numerous ways:

1. Early detection and response to security incidents. To detect threats or security issues in real-time, security analytics solutions analyze data from a variety of sources, connecting the dots between various events and alerts. The security analytics software does this by analyzing log data, combining it with data from other sources, and identifying correlations between events.

2. Adherence to regulatory standards. Compliance with government and industry laws is a primary motivation for security analytics technologies. Security analysis tools integrate a wide range of data types to give companies a single, unified view of all data events across devices, as required by regulations like HIPAA and PCI-DSS.

3. Improved forensics capabilities. For performing forensic investigations into occurrences, security analytics technologies are extremely useful. Security analytics tools can reveal the source of an attack, how a compromise occurred, what resources were affected, what data was lost, and more, as well as a timeline for the incident. Being able to recreate and analyze an incident might assist to inform and enhance organizational defenses in the future, ensuring that similar incidents do not occur.


From boosting data visibility and threat detection to network traffic analysis and user behavior tracking, security analytics offers a wide range of applications. The following are some of the most common security analytics use cases:

  • Employee monitoring
  • Detecting data exfiltration by attackers
  • Detecting insider threats
  • Identifying compromised accounts

Above all, through the correlation of actions and alarms, security analytics aims to turn raw data from various sources into actionable insights in order to identify situations that require prompt attention. Security analytics technologies do this by adding a critical filter to the massive amounts of data provided by people, apps, networks, and other security solutions.

Threat Intelligence – Everything You Need To Know

Threat intelligence (cyber threat intelligence) is information that an organization uses to understand the threats that are currently targeting it. This data is used to prepare, prevent, and identify cyber threats seeking to exploit valuable resources. TI assists organizations in being prepared for emerging threats, making an important contribution to overall security functions.

Threat intelligence enables organizations in gaining valuable knowledge about these threats, develop effective defense mechanisms, and mitigate risks that could impact their bottom line and reputation. After all, targeted threats necessitate targeted defense, and cyber threat intelligence enables more proactive defense. Cyber threat intelligence, like all intelligence, adds value to cyber threat information by reducing uncertainty for the consumer while assisting the consumer in identifying threats and opportunities. To produce accurate, timely, and relevant intelligence, analysts identify similarities and differences in huge amounts of data and detect deceptions.

Four types of threat intelligence

 Threat intelligence is gathered from various sources and tools; however, TI is classified into four categories based on the functions:

1. Strategic

2. Tactical

3. Operational

4. Technical

Nevertheless, hackers are not the only users and should not be. The main objective of this incredible tool is to assist organizations in protecting their data. As a result, just as hackers find information to hack, enterprises can find information to secure themselves. Sensitive information and credentials will be safe in the hands of the owner if discovered first. It means that something important has been leaked, and finding the security hole before the hacker will mitigate the risk.

1.     Strategic TI

It provides a greater level of detail, giving a broad picture of the dangerous landscape. It also gives information on how attack trends affect corporate decisions and finances. This makes it more important for higher-level executives to use it to assist them to define new strategies for the organization’s security functions. By focusing on the effect and possibilities of risk, it takes a risk-based approach.

2.     Tactical TI 

This is more detailed, lower-level data. More particularly, it provides information about an adversary’s technical capabilities or TTP. It is meant for a more technical team – IT managers, SOC managers, NOC managers, and similar responsibilities – because it is more extensive. It is critical to assist them in developing or updating their defense strategy. The sources from which the information is acquired are just as detailed and technical as the final product. It comes from malware and incident reports, as well as reports from various attack groups and human intelligence. 

3.     Operational TI 

It’s a higher-level intelligence source that focuses on information about a particular company threat. It gives network defenders, fraud detection managers, IT team managers, and other security operations higher-ups detailed information. Information from hacker forums, chat rooms, and discussions are used to create Operation TI.

4.     Technical TI

 It provides particular attack indications and helps security professionals in analyzing those cyberattacks to develop new rules in existing security solutions such as firewalls or endpoint security systems. IP addresses, phishing information, malware samples, malicious URLs, hashes, and other technical information are all included in technical TI. However, because threat actors frequently change their strategies, this is only short-term information.

Threat intelligence has benefited state, local, tribal, and territorial (SLTT) government institutions at all levels, from senior executives like Chief Information Security Officials (CISOs), police chiefs, and policymakers to field personnel like information technology professionals and law enforcement officers. Cyber threat information, when used correctly, can provide additional insight into cyber threats, allowing for a quicker, more targeted reaction as well as resource development and allocation.

The integration of cyber threat intelligence into SLTT government activities will become increasingly important over the coming few years, as all levels and people will be required to respond to the cyber threat.